Sie sind auf Seite 1von 25

Which one of the binary bit patterns below denotes a Class B address?

Assuming that our network is using an older version of UNIX what is the maximum
number of subnets that can be assigned to networks when using the address 131.10
7.0.0 with a subnet mask of 255.255.240.0?1)You need to choose a routing protoco
l for a new IIHT network. This network will be running IP, IPX,
and Appletalk, and you wish to utilize only one routing protocol. Which one woul
d be the best choice?
A)OSPF
B)EIGRP
C)RIP v2
D)IGRP
2)Frame Relay uses ___________ to define the rate, in bits per second, that the
Frame Relay switch agrees to transfer data?
A)Clock rate (CR).
B)Committed Information Rate (CIR)
C)Local management interface (LMI)
D)Data-link connection identifier (DLCI)
3)Which channels are used by ISDN BRI?
A)2d+1b
B)23d+1b
C)2b+1d
D)23b+1d
4)What is the reason for configuring a passive interface on a router? (Select on
ly one answer)
A)Allows interfaces to share common IP addresses.
B)Allows an interface to remain up without the aid of keepalives.
C)Allows a router to send routing and not receive updates via that interface.
D)Allows a router to receive routing updates on an but not send updates via that
interface.
5)A routing table contains static, RIP, and IGRP routes destined to the same net
work with each route set to
its default administrative distance. Which route will be the preferred route?
A)The RIP route
B)The static route
C)The IGRP route
D)All three will load balance.
6)What parameters must you specify when you enable EIGRP routing?
A)The broadcast address, and AS number
B)The network number and AS number
C)EIGRP routing, network number and passive interface
D)EIGRP routing, network number, and AS
7)Which one of the following is a layer 2 broadcast?
A)The IP subnet used is 255.255.255.0
B)The IP address used is 255.255.255.255
C)The MAC address used is 00-00-00-00-00-00
D)The MAC address used is FF-FF-FF-FF-FF-FF.
8)Which of the following answer choices is an additional parameter which must be
supplied before the
IGRP routing process can initialize?
A)Connected subnet numbers
B)Register administrative subnet masks
C)IP address mask
D)Autonomous system number
9)What are two benefits of segmenting a network with a layer 2 bridge? (Choose t
wo)
A)To reduce collisions
B)To increase collisions
C)To add collision domains
D)To have more broadcast domains
10)Which one of the following protocols used in the TCP/IP protocol stack is con
sidered a reliable connection-oriented protocol?
A)IP
B)UDP
C)TCP
D)DNS
11)Which two of the following were created to avoid routing loops with distance
vector routing protocols?
(Choose two)
A)Split horizon.
B)Route Poison.
C)Area Hierarchies.
D)Link State Algorithms.
12)What is the specification for STP?
A)802.1e
B)802.1x
C)802.1d
D)802.1
13)Which two statements about a Layer 2 bridge are true? (Choose two)
A)A bridge floods multicasts
B)A bridge floods broadcasts
C)A bridge does not flood multicasts
D)A bridge does not flood broadcasts.
14)There are some differences between routed and routing protocols. Which of the
following are examples
of those differences? (Choose two.)
A)A routed protocol is assigned to an interface and determines the method of pac
ket delivery.
B)A routing protocol determines the path of a packet through a network.
C)A routed protocol determines the path of a packet through a network.
D)A routing protocol operates at the transport layer of the OSI model.
15)Using the following address and subnet mask 195.106.14.0/24 what is the total
number of networks and the total number of host per network?
A)1 network with 254 hosts
B)2 networks with 128 hosts
C)4 networks with 64 hosts
D)6 networks with 30 hosts.
16)You are the network administrator for a large corporation. You want to be abl
e to store all your configurations in a centralized location. Which of these ser
vers will allow you to do so? (Choose all that apply.)
A)FTP
B)TFTP
C)SQL
D)Oracle
17)Which of the following are true about 172.16.0.254/16?
A)IPX:MAC addresses
B)IP:classC directed broadcast
C)Private IP address:node number
D)Public IP addresses:directed broadcast
18)Assuming that our network is using an older version of UNIX what is the maxim
um number of subnets that can be assigned to networks when using the address 131
.107.0.0 with a subnet mask of 255.255.240.0?
A)16
B)32
C)30
D)14
19)What is the administrative distance of OSPF?
A)90
B)100
C)110
D)120
20)In today's networks which encapsulation methods are most commonly used (ISDN)
?
A)IP and IPX
B)IP and PPP
C)PPP and SDLC
D)PPP and HDLC
21)What are some common layer 2 encapsulations for a WAN link? (Select all the a
ppropriate answer
choices)
A)Ethernet
B)PPP
C)HDLC
D)Frame Relay
22)What is an advantage of segmenting your LAN with a switch?
A)Smaller collision domains.
B)Elimination of broadcast.
C)Decrease cost of implementation.
D)Larger number of users within the same domain.
23)Which of the following routing protocols are less likely prone routing loops
and network reachability
problems when used in discontiguous networks? (Select all valid responses
A)OSPF
B)RIP v2
C)EIGRP
D)IGRP
24)Which wide are network technology was designed to use high-performance digita
l lines and is packet
switched?
A)FDDI
B)ISDN
C)ATM
D)Frame Relay
25)What do the initials CIDR stand for?
A)Classless Interdomain Routing
B)Classful Intradomain Routing
C)Classful Interdomain Routing
D)Classless Intradomain Routing
26)Which one of the following is not an address reserved for private networking
according to RFC 1918?
A)10.10.255.255
B)172.16.100.0
C)192.168.16.100
D)196.128.10.253
27)Which one of the following routing protocols would be the best choice?
A)RIPv1
B)RIPv2
C)IGRP
D)EIGRP
28)Switches have three primary modes to handle frame switching. Which one of the
se modes looks at the destination address and then immediately forwards the fram
e to the destination?
A)CSMA/CD
B)FULL DUPLEX
C)CUT THROUGH
29)Which device enables a router serial interface to connect to the ISDN BRI?
A)NT2
B)NT1
C)TE
D)TA
30)The 213.115.77.0 network was subnetted using a /28 subnet mask. How many usab
le subnets and host
addresses per subnet were created as a result of this?
A)2 networks with 62 hosts
B)6 networks with 30 hosts
C)16 networks and 16 hosts
D)14 networks and 14 hosts
31)What are good reasons for using layer two switches? (Choose two)
A)To reduce collisions.
B)To increase collisions.
C)To increase the number of collision domains.
D)To decrease the number of collision domains.
32)What information isn't exchanged by classful routing protocols?
A)Subnet/Prefix Mask
B)Destination IP address
C)Network IP address
D)Host IP address
33)Which one of the following protocols is an example of a link state routing pr
otocol that uses the TCP/IP protocol stack?
A) IP
B)IGRP
C)NLSP
D)OSPF
34)Which address represents a unicast address?
A)224.1.5.2
B)FFFF. FFFF. FFFF.
C)255.255.255.255
D)172.31.128.255/18
35)Which of the following are functions that occur at the transport layer of the
OSI model? (Choose three)
A)Route selection-IP
B)Connection oriented-TCP/IP
C)Three way handshake TCP/IP
D)No acknowledgement-UDP
36)Which of the following IPv4 addresses exist within the private address space?
(Select all that apply.)
A)10.99.244.203
B)172.168.33.28
C)172.16.24.193
D)192.168.23.12
37)Which wide area network technology was designed to work with traditional POTS
lines and provide SOHO's and users with a higher speed digital dial-up service?
A)Frame relay
B)X.25
C)ATM
D)ISDN
38)TCP is considered a reliable protocol. Which one of the following is used to
ensure reliability?
A)Route selection
B)Acknowledgement
C)Session checkpoints
D)System authentication
39)DCE device provides which of the following function?
A)A clock to the DTE.
B)Converts the data into suitable format.
C)Switches the data across the provider's network.
D)All of the above.
40)Which of the following are layer 7 protocols? (Choose two.)
A)Ping
B)Telnet
C)FTP
D)TCP
41)Which one of the following is a layer 2 broadcast?
A)The IP subnet used is 255.255.255.0
B)The IP address used is 255.255.255.255
C)The MAC address used is 00-00-00-00-00-00
D)The MAC address used is FF-FF-FF-FF-FF-FF.
42)For security reasons you would like a system message displayed when logging i
nto a router. Which of the following allows you to create this message?
A)Banner MOTD
B)Message MOTD
C)Banner Message
D)Message Banner
43)You have the binary number 10011101. Convert it to its decimal and hexadecima
l equivalents. (Select
two answer choices)
A)158
B)0x9D
C)156
D)157
44)Which of the following topology share a single channel on which all stations
can receive and transmit data?
A)LAN
B)Bus
C)Tree
D)None of the above
45)You are a technician at IIHT. Your newly appointed IIHT trainee wants to know
what the CDP is. What would your reply be? (Choose all that apply.)
A)It is globally enabled by default on Cisco routers.
B)It is globally enabled by default on all routers.
C)It is a proprietary protocol.
D)It can be used to gather hardware and protocol information about neighbor devi
ces.
46)Which devices operate at the level above the physical layer? (Choose two.)
A)router
B)SMTP server
C)bridge
D)switch
47)Which of the following WAN services uses packet switching? (Select all that a
pply.)
A)HDLC
B)LAPB
C)Frame Relay
D)ATM
48)How does a layer two device such as a bridge or switch function?
A)It maintains a table of the IP address of the host connected to its internet s
egment
B)It passes packets outside of its network segment if its IP address cannot be f
ound on its table.
C)It looks up the frames destination in its address table and sends the frame to
wards the destination.
D)It maintains the table of the data link layer and network layer addresses for
the host connected to its
network segment.
It maintains the table of the data link layer and network layer addresses for th
e host connected to its
network segment.
It maintains the table of the data link layer and network layer addresses for th
e host connected to its network segment.
49)Which of the following are functions that occur at the transport layer of the
OSI model? (Choose three)
A)Route selection-IP
B)Connection oriented-TCP/IP
C)Three way handshake TCP/IP
D)No acknowledgement-UDP
50)If the router does not have an ISDN BRI interface, which device will you need
to connect to ISDN services?
A)NT1
B)TA
C)TE1
D)TE2
51)Which one of the following is a reason to use a hardware address?
A)To obtain a vendor code/serial number from the user.
B)To transmit a frame from one interface to another interface.
C)To transmit a packet from one local device to another local device.
D)To transmit data from one local device to remote device across Internet.
52)What is the default encapsulation on point-to-point links between two Cisco r
outers?
A)SDLC
B)HDLC
C)Cisco
D)Ansi
53)In regards to the ISDN BRI standard, which channel is used for control?
A)B
B)D
C)E
D)I
54)Which one of the binary bit patterns below denotes a Class B address?
A)0xxxxxxx
B)10xxxxxx
C)110xxxxx
D)1110xxxx
55)The following IP address is listed in dotted decimal format. What is the corr
esponding binary value of this IP address?
112.14.12.8
A)01100000.00110000.01101111.10110111
B)0.11.0.11
C)01110000.00001110.00001100.00001000
D)01110000.00001110.11000000.00110011
56)Identify 2 characteristics of PPP.
A)Uses LLC to establish the link
B)Default serial encapsulation
C)Support multiple layer 3 protocols
D)Offers two types of authentication; PAP and CHAP
57)Which of the following IP addresses is a private IP address? Select all that
apply.
A)12.0.0.1
B)168.172.19.39
C)172.20.14.36
D)192.168.42.34
58)Which layer uses the Segment as a Protocol Data Unit (PDU)?
A)Layer 3, Network
B)Layer 1, Physical
C)Layer 2, Data Link
D)Layer 4, Transport
59)You are using setup mode to configure your router for the first time. What do
es the square bracket indicate in setup mode?
A)Current or default settings
B)Hard coded values that cannot be modified
C)Values entered by the administrator but not saved
D)None of thesw
60)Identify 3 characteristics of ISDN?
A)Transports voice and data
B)Transports voice only
C)Support both BRI and PRI
D)Runs over existing phone lines
61)How many usable IP addresses can you get from a conventional Class C address?
A)128
B)192
C)254
D)256
62)IGRP is Cisco proprietary routing protocol that as all routing protocols uses
metrics to determine the best path to a destination. Which are the default metr
ics for this routing protocol? (Choose all that apply)
A)Maximum Transmission Unit
B)cumulative interface delay
C)path bandwidth value
D)reliability from source to destination E. link loading in bits-per-second
63)Which one of the following is a layer 2 broadcast?
A)The IP subnet used is 255.255.255.0
B)The IP address used is 255.255.255.255
C)The MAC address used is 00-00-00-00-00-00
D)The MAC address used is FF-FF-FF-FF-FF-FF.
64)Which channels are used by ISDN BRI?
A)2d+1b
B)23d+1b
C)2b+1d
D)23b+1d
65)Which address represents a unicast address?
A)224.1.5.2
B)FFFF. FFFF. FFFF.
C)255.255.255.255
D)172.31.128.255/18
66)Which two statements about a Layer 2 bridge are true? (Choose two)
A)A bridge floods multicasts
B)A bridge floods broadcasts
C)A bridge does not flood multicasts
D)A bridge does not flood broadcasts.
67)What is the reason for configuring a passive interface on a router? (Select o
nly one answer)
A)Allows interfaces to share common IP addresses.
B)Allows an interface to remain up without the aid of keepalives.
C)Allows a router to send routing and not receive updates via that interface.
D)Allows a router to receive routing updates on an interface but not send update
s via that interface.
68)Which one of the following protocols used in the TCP/IP protocol stack is con
sidered a reliable connection-oriented protocol?
A)IP
B)UDP
C)TCP
D)DNS
69)Which of the following routing protocols are less likely prone routing loops
and network reachability
problems when used in discontiguous networks? (Select all valid responses
A)OSPF
B)RIP v2
C)EIGRP
D)IGRP
70)If RIP uses hop count to determine the best path what does IGRP use?
A)The highest metric value.
B)The lowest composite metric value.
C)The lowest hop-count and delay.
D)The highest bandwidth and reliability
71)A routing table contains static, RIP, and IGRP routes destined to the same ne
twork with each route set to
its default administrative distance. Which route will be the preferred route?
A)The RIP route
B)The static route
C)The IGRP route
D)All three will load balance.
72)Assuming that our network is using an older version of UNIX what is the maxim
um number of subnets that can be assigned to networks when using the address 131
.107.0.0 with a subnet mask of 255.255.240.0?
A)16
B)32
C)30
D)14
73)Your ISP has provided you the following class B network range 131.107.0.0/24.
Which of the following statements is true regarding this network?
(Choose two.)
A)There are 254 usable hosts per subnet
B)There is one usable network.
C)There are 255 usable hosts per subnet
D)There are 254 usable subnets.
74)Which of the following protocols is referred to as a hybrid routing protocol
because it has features of
both distance-vector and link-state?
A)RIP
B)OSPF
C)EIGRP
D)IGRP
75)Which one of the following routing protocols would be the best choice?
A)RIPv1
B)RIPv2
C)IGRP
D)EIGRP
76)Which of the following protocols supports VLSM in a Cisco routing environment
? (Choose all that apply.)
A)Static routing
B)OSPF
C)IS-IS
D)EIGRP
77)What do the initials CIDR stand for?
A)Classless Interdomain Routing
B)Classful Intradomain Routing
C)Classful Interdomain Routing
D)Classless Intradomain Routing
78)Which two of the following were created to avoid routing loops with distance
vector routing protocols?
(Choose two)
A)Split horizon.
B)Route Poison.
C)Area Hierarchies.
D)Link State Algorithms.
80)Which of the routing protocols shown below support both VLSM and route summar
ization? (Select
three)
A)IGRP B. EIGRP
B)EIGRP
C)RIP v2
D)OSPF
81)Which of the following protocols are routing rather than routed protocols? (C
hoose all that apply.)
A)IP
B)IPX
C)OSPF
D)EIGRP
82)Select all of the below technologies that are designed to conserve IP address
spaces. (select all that apply)
A)CIDR
B)Classless routing protocols
C)VLSM
D)None of these
83)With classful routing, if one part of a major network is known, but the subne
t toward which the packet is destined within that major network is unknown, the
packet is dropped.
A)This does not apply to the latest IOS
B)False
C)None of the choices
D)True
84)Which of the following statements are correct in regard to classless routing
protocols? (Select two)
A)Discontiguous subnets are not allowed.
B)Variable length subnet masks are allowed.
C)RIP v1 is a classless routing protocol.
D)RIP v2 supports classless routing.
85)Which device enables a router serial interface to connect to the ISDN BRI?
A)NT2
B)NT1
C)TE
D)TA
86)The IP address 131.107.0.0 is a class B address. What is the range of binary
values for the first octet in this address class?
A)10000000-11111111
B)00000000-10111111
C)10000000-10111111
D)11000000-11101111
87)Which switching mode reads the entire frame including the CRC before the fram
e is forwarded?
A)CSMA/CD
B)Full duplex.
C)Cut through
D)Store and forward
88)What one of the following is an example of a layer 2 MAC address?
A)192.201.63.251
B)19-22-01-63-25
C)0000.1234.FEG
D)00-00-12-34-FE-AA
89)Which one of the following is not an address reserved for private networking
according to RFC 1918?
A)10.10.255.255
B)172.16.100.0
C)192.168.16.100
D)196.128.10.253
90)Ethernet switches operate at the Data Link layer of the OSI model. These Laye
r 2 devices have three major functions which of the following describe these fun
ctions? (Choose three)
A)Loop avoidance
B)Address learning
C)Hop count limiting
D)Packet forward/filtering.
91)There are some differences between routed and routing protocols. Which of the
following are examples
of those differences? (Choose two.)
A)A routed protocol is assigned to an interface and determines the method of pac
ket delivery.
B)A routing protocol determines the path of a packet through a network.
C)A routed protocol determines the path of a packet through a network.
D)A routing protocol operates at the transport layer of the OSI model.
92)What are good reasons for using layer two switches? (Choose two)
A)To reduce collisions.
B)To increase collisions.
C)To increase the number of collision domains.
D)To decrease the number of collision domains.
93)Which wide are network technology was designed to use high-performance digita
l lines and is packet
switched?
A)FDDI
B)ISDN
C)ATM
D)Frame Relay
94)Which of the following is the valid range for an IP extended access list?
A)1 through 99
B)100 through 199
C)800 through 891
D)900 through 990
95)What are the generic parts of a layer 3 address?
A)An internetnetwork number and a URL.
B)A vendor code and a serial number.
C)A network number and host number
D)A broadcast number and unicast number
96)Which wide are network technology was designed to use high-performance digita
l lines and is packet switched?
A)FDDI
B)ISDN
C)ATM
D)Frame Relay
97)Which of the following troubleshooting tools use the protocol ICMP? (Choose t
wo)
A)Ping
B)Telnet
C)Configure
D)Trace route
98)Which one of the following commands will start the IP processing on interface
e0?
A)IP-Space enable.
B)Network IP-Address
C)IP address IP-address subnet mask
D)Copy running-configuration to startup-configuration.
99)You purchased a router from an online auction. You issued the erase startup-c
onfig command on this router to return the router to factory defaults. When you
power cycle the router what mode will the router boot up in?
A)Setup
B)Startup
C)User EXEC
D)User privileged
100)CSMA/CD stands for which of the following?
A)Carrier Sense, Multiple Access with Collision Detection
B)Collision SenseAccess with Collision Detection
C)Collision Sense, Multiple Access with Carrier Detection
D)Carrier Sense, MAC address with Collision Detection
101)Which protocol is responsible for establishing, configuring, testing, mainta
ining and terminating PPP connections?
A)BRI
B)PRI
C)LCP
D)NCP
102)A traffic light is an example of what type of mechanism?
A)Collision detection
B)Flow control
C)Sequence numbering
D)Network management
103)Which of the following are functions that occur at the transport layer of th
e OSI model? (Choose three)
A)Route selection-IP
B)Connection oriented-TCP/IP
C)Three way handshake TCP/IP
D)No acknowledgement-UDP
104)Which one of the following protocols used in the TCP/IP protocol stack is co
nsidered a reliable connection-oriented protocol?
A)IP
B)UDP
C)TCP
D)DNS
105)How can you use ISDN?
A)To improve Internet response times
B)To encapsulate other WAN services
C)To add bandwidth for telecommuting
D)To carry multiple Network-layer protocols
106)Which of the following WAN services uses packet switching? (Select all that
apply.)
A)HDLC
B)LAPB
C)Frame Relay
D)ATM
107)How many usable IP addresses can you get from a conventional Class C address
?
A)128
B)192
C)254
D)256
108)Of the following address
11000000.11000000.11110000.10000001,
what is true?
A)It is a class C address
B)It has a host id of 192.224.128
C)It has a host id 128
D)It is a class B address.
109)To perform password recovery on a Cisco router you have to modify which of t
he following?
(Choose two.)
A)Nvram
B)Configuration register
C)Boot flash
D)cmos
110)The IP address 131.107.0.0 is a class B address. What is the range of binary
values for the first octet in
this address class?
A)10000000-11111111
B)00000000-10111111
C)10000000-10111111
D)10000000-11011111
111)Which layers of the OSI model are included in the lower layers?
A)Application, Session, Presentation
B)Physical, Transport, Data Link, Network
C)Data link, Physical, Network
D)Session, Data Link, Physical
112)Which OSI layer incorporates the MAC address and the LLC?
A)Data Link
B)Network
C)Physical
D)Transport
113)With regard to bridges and switches, which of the following statements are t
rue? (Choose three.)
A)Switches are primarily software based while bridges are hardware based.
B)Both bridges and switches forward Layer 2 broadcasts.
C)Both bridges and switches make forwarding decisions based on Layer 2 addresses
.
D)Switches typically have a higher number of ports than bridges.
114)Which layer of the OSI model handles data translation, code formatting, and
encryption occur?
A)Physical
B)Data Link
C)Network
D)Presentation
115)If you take a dotted-decimal class A IP address such as 10.0.0.1 and convert
the first octet to binary.
Which of the following is the correct bit pattern for the first octet?
A)0xxxxxxx
B)10xxxxxx
C)110xxxxx
D)1110xxxx
116)The default bandwidth of a high-speed serial link is 1.544 or T1. What is th
e correct command to change the bandwidth of the interface to 64K?
A)Bandwidth 64
B)Bandwidth 64000
C)Band width 64000
D)Bandwidth 64K
117)Which of the following topology share a single channel on which all stations
can receive and transmit data?
A)LAN
B)Bus
C)Tree
D)None of the above
118)Which layer uses the Segment as a Protocol Data Unit (PDU)?
A)Layer 3, Network
B)Layer 1, Physical
C)Layer 2, Data Link
D)Layer 4, Transport
119)Which of the following are Application layer protocols that use TCP/IP? (Cho
ose three.)
A)ARP
B)HTTP
C)SMTP
D)FTP
120)After replacing the NIC card of a PC on the LAN, your Cisco switch shows a n
ew MAC address is
attached to that port. Which of the following answer choices below correctly des
cribe a MAC address?
A)It is a globally unique IP address.
B)It is a globally unique 48 bit address
C)It is provided by the manufacturer of the NIC.
D)It is provided by the manufacturer of the NIC.
121)If the router does not have an ISDN BRI interface, which device will you nee
d to connect to ISDN services?
A)NT1
B)TA
C)TE1
D)TE2
122)Your company is concerned about Security on your network. Each department ha
s its own file server
and the company also has an enterprise server that is shared by all departments.
The accounting
department is concerned about the accounting information being accessible from t
he other departments.
What can you as the network administrator use to control the information so that
it's not being passed
between the departments?
A)Bridge between management and sites.
B)Routers to provide the most secure segmentation.
C)An Ethernet switch to secure separation through programming the access list of
each port of the switch.
D)All of these
123)Which one of the following protocols is an example of a link state routing p
rotocol that uses the TCP/IP protocol stack?
A)IP
B)IGRP
C)NLSP
D)OSPF
124)What are good reasons for using layer two switches? (Choose two)
A)To reduce collisions.
B)To increase collisions.
C)To increase the number of collision domains.
D)To decrease the number of collision domains.
125)Cisco supports three types of switching modes on switches. Which mode of swi
tching can have a variable latency through the switch?
A)Store-and-forward
B)Cut-through
C)Fragment-free.
D)All of these
126)Which of the following correctly describe IP addressing? (Choose Two)
A)IP multicast addresses start with 240
B)A host portion of all 1's indicates a network broadcast
C)The value of zero (0) in the host portion means "all hosts" on the network
D)IP addresses are four octets long and contain a network portion and a host por
tion.
127)Your company has decided to pay for one ISDN B channel to your to house so t
hat you can do some technical support from home. What is the bandwidth capacity
of a single ISDN B channel?
A)16 Kbps
B)64 Kbps
C)128 Kbps
D)512 Kbps
128)Which of the following are benefits provided with access control lists (ACLs
)? (Select all that apply)
A)ACLs monitor the number of bytes and packets.
B)Virus detection.
C)ACLs identify interesting traffic for DDR.
D)ACLs provide IP route filtering.
129)IGRP is Cisco proprietary routing protocol that as all routing protocols use
s metrics to determine the best path to a destination. Which are the default met
rics for this routing protocol? (Choose all that apply)
A)Maximum Transmission Unit
B)cumulative interface delay
C)path bandwidth value
D)reliability from source to destination E. link loading in bits-per-second
130)When using Frame Relay which statement about the Committed Information Rate
(CIR) is true?
A)It is the rate, in bits per second, at which the Frame Relay switch agrees to
transfer data
B)It is the clock speed (port speed) of the connection (local loop) to the Frame
Relay cloud
C)It is the maximum number of bits that the switch can transfer during any Commi
tted Rate Measurement Interval
D)None of these
131)Which of the following WAN encapsulations support multiple upper layer proto
cols? (Choose Two)
A)PPP
B)LAPD
C)ISDN
D)HDLC
132)What is an advantage of segmenting your LAN with a switch?
A)Smaller collision domains.
B)Elimination of broadcast.
C)Decrease cost of implementation.
D)Larger number of users within the same domain.
133)You want to use a routing protocol that utilizes the benefits of both distan
ce vector and link
state. Which routing protocol will you use?
A)IP
B)RIP
C)EIGRP
D)OSPF

134)What is the administrative distance of OSPF?


A)90
B)100
C)110
D)120
135)To successfully troubleshoot LAN/WAN connectivity problems on a router which
of the following
commands could you use? (Choose three.)
A)Ping
B)Tracert
C)Show ip route
D)Show interfaces
136)Which of the following represents the benefits of VLSM hierarchical addressi
ng? (Choose two.)
A)Reducing the amount of information stored in routing tables
B)Enabling the use of addressing with discontiguous networks
C)Allocating IP addresses more efficiently
D)Allowing for classful routing algorithms
137)What are benefits of bridging (Choose two.)
A)To reduce broadcasts within collisions domains
B)To reduce collisions within broadcasts domain.
C)To increase the number of broadcasts domains.
D)To increase the number of collision domains.
138)CIDR is predominantly used in which of the following scenarios?
A)OSPF only
B)EIGRP only
C)Route summarization
D)Classless routing
139)Which wide are network technology was designed to use high-performance digit
al lines and is packet
switched?
A)FDDI
B)ISDN
C)ATM
D)Frame Relay
140)How many valid host IP addresses are available on the following network/subn
etwork 131.107.10.16/30?
A)2
B)30
C)254
D)16,382
141)IP addresses use hierarchical numbering. What portion of the address that wi
ll identify the network
number?
A)Subnet Mask.
B)Dots between octets.
C)Class of first octet.
D)Assignments of DHCP.
142)Which address represents a unicast address?
A)224.1.5.2
B)FFFF. FFFF. FFFF.
C)255.255.255.255
D)172.31.128.255/18
143)Ethernet switches operate at the Data Link layer of the OSI model. These Lay
er 2 devices have three major functions which of the following describe these fu
nctions? (Choose three)
A)Loop avoidance
B)Address learning
C)Hop count limiting
D)Packet forward/filtering.
144)Which switching mode reads the entire frame including the CRC before the fra
me is forwarded?
A)CSMA/CD
B)Full duplex.
C)Cut through
D)Store and forward
145)Which one of the following parameters is the very first thing that needs to
be configured as part of the
IGRP routing process?
A)The wild card mask
B)The IP address
C)The IP address mask
D)The Autonomous System number
146)What are some common layer 2 encapsulations for a WAN link? (Select all the
appropriate answer
choices)
A)Ethernet
B)PPP
C)HDLC
D)Frame Relay
147)Which one of the following is a layer 2 broadcast?
A)The IP subnet used is 255.255.255.0
B)The IP address used is 255.255.255.255
C)The MAC address used is 00-00-00-00-00-00
D)The MAC address used is FF-FF-FF-FF-FF-FF.
148)RIP and IGRP are ___________ protocols.
A)classless
B)classful
C)class-neutral
D)None of the these
149)IP addresses use hierarchical numbering. What portion of the address that wi
ll identify the network number?
A)Subnet Mask
B)Dots between octets
C)Class of first octet
D)Address Resolution Protocol.
150)Which of the following can IGRP use in the calculation of its routing metric
s? (Choose all that apply.)
A)Bandwidth
B)Delay
C)Load
D)Reliability
151)You have just purchased a brand new router and need to configure this router
after the router boots up you exit the setup mode by pressing Ctrl-C and you ar
e now in user mode which command do you use to enter the privileged mode so that
you can configure the router?
A)Set
B)Enable
C)Configure
D)Privileges
152)Which one of the following is a reason to use a hardware address?
A)To obtain a vendor code/serial number from the user.
B)To transmit a frame from one interface to another interface.
C)To transmit a packet from one local device to another local device.
D)To transmit data from one local device to remote device across Internet.
153)Which of the following are layer 7 protocols? (Choose two.)
A)Ping
B)Telnet
C)FTP
D)TCP
154)Identify the order of the 5 step encapsulation?
1. Create the segment
2. Convert the frame to bits
A)1,2,4,2,5
B)2,1,3,4,5
C)5,1,3,4,2
D)5,3,4,1,2
155)What is the network address for a host with the IP address 123.200.8.68/28?
A)123.200.8.0
B)1231.200.8.32
C)123.200.8.64
D)123.200.8.65
156)Which of the following IP addresses is a private IP address? Select all that
apply.
A)12.0.0.1
B)168.172.19.39
C)172.20.14.36
D)192.168.42.34
157)For security reasons you would like a system message displayed when logging
into a router. Which of the following allows you to create this message?
A)Banner MOTD
B)Message MOTD
C)Banner Message
D)Message Banner
158)Which of the following is a Class A IP address?
A)10.14.16.12
B)127.0.0.1
C)172.15.42.34
D)209.123.32.212
159)Which one of the following is true about User Datagram Protocol?
A)It is reliable and acknowledged.
B)It is unreliable and acknowledged.
C)It is reliable and unacknowledged.
D)It is unreliable and unacknowledged.
160)Routers perform which of the following functions? (Select three)
A)Packet switching
B)Collision prevention on a LAN segment.
C)Packet filtering
D)Internetwork communication
161)Which of the following topology is least affected by the removal of workstat
ions?
A)Ring
B)Star
C)Bus
D)Tree
162)If you take a dotted-decimal class A IP address such as 10.0.0.1 and convert
the first octet to binary. Which of the following is the correct bit pattern fo
r the first octet?
A)0xxxxxxx
B)10xxxxxx
C)110xxxxx
D)1110xxxx
163)Which devices operate at the level above the physical layer? (Choose two.)
A)router
B)SMTP server
C)bridge
D)switch
164)Which of the following networking solution is suitable for networking within
a building?
A)WAN
B)LAN
C)MAN
D)None of the above
165)Where is encapsulation used in the OSI model?
A)All seven layers of the receiving station
B)At peer layers of both the sending station and receiving station
C)Only at the Network layer
D)At the sending station
166)In comparing TCP with UDP what is an advantage of using a connectionless pro
tocol such as UDP?
A)Packet acknowledgement may reduce overhead traffic.
B)Loss or duplication of data packets is less likely to occur.
C)Packets are not acknowledged which reduces overhead traffic.
D)The application relies on the transport layer for sequencing of the data packe
ts.
167)With regard to bridges and switches, which of the following statements are t
rue? (Choose three.)
A)Switches are primarily software based while bridges are hardware based.
B)Both bridges and switches forward Layer 2 broadcasts.
C)Both bridges and switches make forwarding decisions based on Layer 2 addresses
.
D)Switches typically have a higher number of ports than bridges.
168)DCE device provides which of the following function?
A)A clock to the DTE.
B)Converts the data into suitable format.
C)Switches the data across the provider's network.
D)All of the above.
169)Identify 2 characteristics of PPP.
A)Uses LLC to establish the link
B)Default serial encapsulation
C)Support multiple layer 3 protocols
D)Offers two types of authentication; PAP and CHAP
170)Your IIHT trainee Fred asks you what 11111001 binary is in decimal. What sho
uld you tell him?
A)6
B)193
C)225
D)249
171)User Datagram Protocol works at which layer of the DOD model?
A)Transport
B)Internet
C)Host-to-Host
D)Data Link
172)Which of the following troubleshooting tools use the protocol ICMP? (Choose
two)
A)Ping
B)Telnet
C)Configure
D)Trace route
173)You need to segment your network which of the following hardware devices can
you use to segment your network? (Choose three.)
A)Repeater
B)Switch
C)Bridge
D)Router
174)The Defense Advanced Research Projects Agency (DAPRA) developed the TCP/IP s
uite of protocols.
Which layer in that TCP/IP model corresponds to the OSI model's network layer?
A)Application
B)Transport
C)Internet
D)Network
175)Identify the purpose of ARP?
A)Avoiding routing loops
B)Determining a workstation's IP address
C)Sending a directed broadcast
D)Determining a workstation's MAC address
176)Identify the 3 devices which you would not install to prevent broadcast.
A)Switch
B)Repeater
C)Bridge
D)Router
177)What is the default encapsulation on point-to-point links between two Cisco
routers?
A)SDLC
B)HDLC
C)Cisco
D)ANSI
178)You have the binary number 10011101. Convert it to its decimal and hexadecim
al equivalents. (Select
two answer choices)
A)158
B)0x9D
C)156
D)157
179)Which of the following can be used to establish bidirectional communication
between two DTE devices?
A)CVC
B)DVC
C)PVC
D)SVC
180)Which one of the following statement about an Ethernet LAN is true?
A)The advantage of a full duplex is the ability to transmit data over Mbase2 cab
le.
B)Full duplex Ethernet requires a point-to-point connection when only two nodes
are present.
C)Ethernet switches can use full duplex mode to connect multiple nodes to a sing
le port of a switch.
D)Half duplex is a cut through packet processing method that is very fast with l
ittle error correction
181)Which one of the binary bit patterns below denotes a Class B address?
A)0xxxxxxx
B)10xxxxxx
C)110xxxxx
D)1110xxxx
182)Frame Relay uses ___________ to define the rate, in bits per second, that th
e Frame Relay switch agrees to transfer data?
A)Clock rate (CR).
B)Committed Information Rate (CIR)
C)Local management interface (LMI)
D)Data-link connection identifier (DLCI)
183)IP addresses use hierarchical numbering. What portion of the address that wi
ll identify the network
number?
A)Subnet Mask.
B)Dots between octets.
C)Class of first octet.
D)Assignments of DHCP.
184)Your company has decided to pay for one ISDN B channel to your to house so t
hat you can do some technical support from home. What is the bandwidth capacity
of a single ISDN B channel?
A)16 Kbps
B)64 Kbps
C)128 Kbps
D)512 Kbps
185)Switches have three primary modes to handle frame switching. Which one of th
ese modes looks at the destination address and then immediately forwards the fra
me to the destination?
A)CSMA/CD
B)FULL DUPLEX
C)CUT THROUGH
D)None of these
186)The IP address 131.107.0.0 is a class B address. What is the range of binary
values for the first octet in this address class?
A)10000000-11111111
B)00000000-10111111
C)10000000-10111111
D)11000000-11101111
187)Which of the following routing protocols do NOT support VLSM (variable lengt
h
subnet masking)? (Choose all that apply).
A)RIPv1
B)IGRP
C)EIGRP
D)OSPF
188)IGRP is Cisco proprietary routing protocol that as all routing protocols use
s metrics to determine the best path to a destination. Which are the default met
rics for this routing protocol? (Choose all that apply)
A)Maximum Transmission Unit
B)cumulative interface delay
C)path bandwidth value
D)reliability from source to destination E. link loading in bits-per-second
189)Which switching mode reads the entire frame including the CRC before the fra
me is forwarded?
A)CSMA/CD
B)Full duplex.
C)Cut through
D)Store and forward
190)You want to use a routing protocol that utilizes the benefits of both distan
ce vector and link
state. Which routing protocol will you use?
A)IP
B)RIP
C)EIGRP
D)OSPF
191)Which of the following describe private IP addresses? (Choose two)
A)Addresses chosen by a company to communicate with the Internet.
B)Addresses that cannot be routed through the public Internet.
C)Addresses that can be routed through the public Internet.
D)A scheme to conserve public addresses.
192)You need to choose a routing protocol for a new IIHT network. This network w
ill be running IP, IPX,
and Appletalk, and you wish to utilize only one routing protocol. Which one woul
d be the best choice?
A)OSPF
B)EIGRP
C)RIP v2
D)IGRP
193)Which of the following devices support Full Duplex Ethernet ? (Choose two.)
A)Switch to host.
B)Switch to switch.
C)Hub to hub.
D)Switch to hub.
194)Which one of the following parameters is the very first thing that needs to
be configured as part of the
IGRP routing process?
A)The wild card mask
B)The IP address
C)The IP address mask
D)The Autonomous System number
195)Which of the following protocols is referred to as a hybrid routing protocol
because it has features of
both distance-vector and link-state?
A)RIP
B)OSPF
C)EIGRP
D)IGRP
196)What is an advantage of segmenting your LAN with a switch?
A)Smaller collision domains.
B)Elimination of broadcast.
C)Decrease cost of implementation.
D)Larger number of users within the same domain.
197)The _________ is the rate in bits per second which a Frame Relay switch agre
es to transfer data?
A)Clock rate
B)Committed information rate
C)Local management interface
D)Committed rate measurement interval.
198)With classful routing, if one part of a major network is known, but the subn
et toward which the packet is destined within that major network is unknown, the
packet is dropped.
A)This does not apply to the latest IOS
B)False
C)None of the choices
D)True
199)Which of the following protocols are routing rather than routed protocols? (
Choose all that apply.)
A)IP
B)IPX
C)OSPF
D)EIGRP
200)What are the generic parts of a layer 3 address?
A)An internetnetwork number and a URL.
B)A vendor code and a serial number.
C)A network number and host number
D)A broadcast number and unicast number
201)Which device enables a router serial interface to connect to the ISDN BRI?
A)NT2
B)NT1
C)TE
D)TA
202)Which of the following protocols supports VLSM in a Cisco routing environmen
t? (Choose all that apply.)
A)Static routing
B)OSPF
C)IS-IS
D)EIGRP
203)Cisco's switching modes include cut-through, store and forwarded and a modif
ied version of the first two methods. Which statement about switching methods is
true?
A)The stored and forward method has low latency
B)The cut through method and switching has high latency
C)The modified version holds the packet in memory until the data portion of the
packet reaches the switch.
D)None of these
204)Which one of the following routing protocols would be the best choice?
A)RIPv1
B)RIPv2
C)IGRP
D)EIGRP
205)You are the network administrator for a large corporation. You want to be ab
le to store all your configurations in a centralized location. Which of these se
rvers will allow you to do so? (Choose all that apply.)
A)FTP
B)TFTP
C)SQL
D)Oracle
206)CIDR is predominantly used in which of the following scenarios?
A)OSPF only
B)EIGRP only
C)Route summarization
D)Classless routing
207)If you take a dotted-decimal class A IP address such as 10.0.0.1 and convert
the first octet to binary. Which of the following is the correct bit pattern fo
r the first octet?
A)0xxxxxxx
B)10xxxxxx
C)110xxxxx
D)1110xxxx
208)Which two statements about a Layer 2 bridge are true? (Choose two)
A)A bridge floods multicasts
B)A bridge floods broadcasts
C)A bridge does not flood multicasts
D)A bridge does not flood broadcasts.
209)Which of the following routing protocols are less likely prone routing loops
and network reachability
problems when used in discontiguous networks? (Select all valid responses
A)OSPF
B)RIP v2
C)EIGRP
D)IGRP
210)When running classful protocols, what global configuration command must be u
sed to send routes to unknown subnets to a default route?
A)ipv6 unicast routing
B)ip classless
C)ip route-cache policy
D)ip subnet-zero
211)To successfully troubleshoot LAN/WAN connectivity problems on a router which
of the following
commands could you use? (Choose three.)
A)Ping
B)Tracert

Das könnte Ihnen auch gefallen